What is standard lifespan for networks

Assignment Help Basic Computer Science
Reference no: EM133052963

Your company's network is up and running and everything seems to be working great.

Now, you have been given a key task, the CTO is due to retire from ACME, Inc. and you are on the finalist list for your excellent work.

The CEO has decided that he wants a forward thinking individual in the CTO spot, so he has asked the finalist to provide him a report.

The report, which should be in a Word document, is your vision for the Network in 1 year, 3 years, and 5 years down the road. Some of the items to include are listed below.

- What is the expected lifespan of our current network (hint: the one you have worked on the past few weeks)?

- What is the standard lifespan for networks?

- What upgrades would you do at each of the intervals listed?

- What technologies should we be aware of coming down the pipeline?

Reference no: EM133052963

Questions Cloud

Importance on disaster recovery : Why is it that some organizations do not place enough importance on disaster recovery? What are examples of the type of disasters that could happen?
Introduction to information systems : This is not merely a summary of the assignment topics, but a description of the concepts that you found valuable for yourself.
Discuss deductive forensics : Discuss Deductive Forensics in terms of anticipating attacks/pre-crime, machine learning forensics, scene of the crime and searching for digital evidence.
Lot of weight to applicants : Several years employers have started to give a lot of weight to applicants who not only have a degree, but who also possess one or more IT certifications.
What is standard lifespan for networks : What is the expected lifespan of our current network. What upgrades would you do at each of the intervals listed? What is the standard lifespan for networks?
About generating a tco approximation for azure : If you and your company are looking into using Azure-based services to replace the existing non-cloud-based systems it currently uses,
Information security risk management program : Explain what is meant by the following statement from the Security Risk Management: Building an Information Security Risk Management Program
About millions and millions of bytes of personal data : With all the stories about millions and millions of bytes of personal data having been exposed, why is there still any faith at all on the Internet?
Control security without monitoring employee actions : Suggest an alternative approach for an organization to control security without monitoring employee actions.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Automated materials handling system

A decrease directly attributable to the $520,000 investment in the automated materials handling system put in place at the beginning of the year.

  Explain which learning experiences facilitated

For this Discussion, reflect on all the material covered in this module. Share with your colleagues your thoughts on what you feel you learned and achieved over these eight weeks.

  Research risk assessment approaches

Research risk assessment approaches. Create an outline for a basic qualitative risk assessment plan. Write an introduction to the plan explaining its purpose.

  Merging of two previous companies

The firm is a merging of two previous companies so they need to implement a new human resource system. You have created a relation about employees as follows:

  Key objectives of the communications plan

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system

  Describe in your own words what rootkit is

Describe in your own words what a rootkit is. Tech companies prepare for cyberattacks using common cybersecurity resources.

  Probability that a family will buy a vacation home in miami

The probability that a family will buy a vacation home in Miami, malibu, or newport is 0.25, 0.10 and 0.35. What is the probability that the family will choose

  Why might the choice of colors green and red be bad

How would we define our function to allow the caller to specify different colors?

  Network lan and the wan links

Use VLSM to configure the given network LAN and the WAN links. VLSM must be used in the MOST efficient way to subnet the LAN and the WAN links. All the links between routers are WAN links.

  Describe the mechanism of the problem

1. Describe the symptoms (what were observed) during the 1986 Therac25 accident. 2. Describe the mechanism of the problem (how did it occur?).

  Components that are present in your network

The first requirement is to list all of the components that are present in your network, to describe which components must be monitored, and to identify the security requirements of each monitored component.

  Discuss the vulnerabilities associated with four

Discuss the vulnerabilities associated with four of the ten networks described in your readings. Make sure you identify the network, potential vulnerabilities, and what the result could be from an attack against it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd